OUR BLOG
GDPR vs CCPA
This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the California Consumer Privacy Act. The European General Data Protection Regulation (GDPR) of 2016, which went into effect on 25 May 2018, offers a new...
A touch on CVE-2020-0796
Introduction In this post, we will aim to touch on the CVE-2020-0796 vulnerability, which was initially publicly disclosed by Microsoft. This post also attempts to illustrate basic windbg usage for dynamic vulnerability analysis. IDA disassembler will also be used in...
Entry level resources for penetration testing
This blog post is the first in a series of posts about the world of web app penetration testing. What you are reading now is but an introduction aiming to introduce the aspiring pentester to essential knowledge and tools. Although further articles addressed to more...
12 Cyber Security Tips For Your Holidays Online Shopping
IoT Penetration Testing Part 1
Part 1 In this blog post series, we will show you certain steps among with the tools used in order to conduct IoT security assessments. In this first part you will need a .bin file of a device firmware in order to continue. Tools needed file It...